[tor-bugs] #8244 [Tor]: The HSDirs for a hidden service should not be predictable indefinitely into the future

Tor Bug Tracker & Wiki blackhole at torproject.org
Sat Dec 28 20:23:57 UTC 2013


#8244: The HSDirs for a hidden service should not be predictable indefinitely into
the future
-----------------------------+-----------------------------------
     Reporter:  arma         |      Owner:
         Type:  enhancement  |     Status:  new
     Priority:  normal       |  Milestone:  Tor: 0.2.5.x-final
    Component:  Tor          |    Version:
   Resolution:               |   Keywords:  tor-hs needs-proposal
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+-----------------------------------

Comment (by asn):

 Apparently the GNUNet people are also in need of a similar mechanism.
 Specifically, they need a way to generate public keys in a collaborative
 byzantine setup; this is harder than our use case, since we only need to
 generate a nonce. Particularly they are planning on implementing a paper
 called "One Round Threshold Discrete-Log Key Generation without Private
 Channels".

 Apparently, the complex is not easy to implement and contains peculiar
 crypto schemes. Part of the complexity is caused by the fact that the
 resulting value must be a public key, so all the nodes have to do multiple
 checks to ensure that the resulting value is a public key.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8244#comment:17>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list